Cyber Security Interview Questions and Answers
Question - 61 : - What is IP and MAC Addresses?
Answer - 61 : -
IP Address is the acronym for Internet Protocol address. An internet protocol address is used to uniquely identify a computer or device such as printers, storage disks on a computer network.
MAC Address is the acronym for Media Access Control address. MAC addresses are used to uniquely identify network interfaces for communication at the physical layer of the network.
Question - 62 : - What do you mean by a worm?
Answer - 62 : -
A Worm is a type of malware which replicates from one computer to another.
Question - 63 : - Name some tools used for packet sniffing.
Answer - 63 : -
Following are some tools used for packet sniffing.
- Tcpdump
- Kismet
- Wireshark
- NetworkMiner
- Dsniff
Question - 64 : - Explain anti-virus sensor systems
Answer - 64 : -
Antivirus is software tool that is used to identify, prevent, or remove the viruses present in the computer. They perform system checks and increase the security of the computer regularly.
Question - 65 : - List out the types of sniffing attacks.
Answer - 65 : -
Various types of sniffing attacks are:
- Protocol Sniffing
- Web password sniffing
- Application-level sniffing
- TCP Session stealing
- LAN Sniffing
- ARP Sniffing
Question - 66 : - What is a distributed denial-of-service attack (DDoS)?
Answer - 66 : -
It is an attack in which multiple computers attack website, server, or any network resource.
Question - 67 : - Explain the concept of session hijacking.
Answer - 67 : -
TCP session hijacking is the misuse of a valid computer session. IP spoofing is the most common method of session hijacking. In this method, attackers use IP packets to insert a command between two nodes of the network.
Question - 68 : - List out various methods of session hijacking.
Answer - 68 : -
Various methods of session hijacking are:
Using packet Sniffers
Cross-Site Scripting (XSS Attack)
IP Spoofing
Blind Attack
Question - 69 : - What are Hacking Tools?
Answer - 69 : -
Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer systems, web applications, servers, and networks. There are varieties of such tools available on the market. Some of them are open source, while others are a commercial solution.
Question - 70 : - Explain honeypot and its Types.
Answer - 70 : -
Honeypot is a decoy computer system which records all the transactions, interactions, and actions with users.
Honeypot is classified into two categories: 1) Production honeypot and 2) Research honeypot.
- Production honeypot: It is designed to capture real information for the administrator to access vulnerabilities. They are generally placed inside production networks to increase their security.
- Research Honeypot: It is used by educational institutions and organizations for the sole purpose of researching the motives and tactics of the back-hat community for targeting different networks.